THC Hydra sends GET request without parameter before actual request with parameter which causes authentication problems

I am using THC Hydra (v9.0) on GNU/Linux to pentest my private API.
The GET route in question requires a key as GET parameter which returns an auth token if the correct key was submitted else "false".
If no key or a wrong key is … Continue reading THC Hydra sends GET request without parameter before actual request with parameter which causes authentication problems

Are dictionary and rainbow table attacks a subset of brute force attacks or are they seperate?

This is more of a question on the actual use of the terms rather than the definitions, so my question is this:
Are dictionary and rainbow table attacks a type of brute force attack or are they different entirely? Would it be okay to call a… Continue reading Are dictionary and rainbow table attacks a subset of brute force attacks or are they seperate?

T-Mobile hacker used brute force attack to steal customers’ data

By Saad Rajpoot
A 21-year-old US citizen named John Binns has claimed responsibility for the T-Mobile data breach and labeled the carrier’s “security is awful.”
This is a post from HackRead.com Read the original post: T-Mobile hacker used brute force a… Continue reading T-Mobile hacker used brute force attack to steal customers’ data

If a platform/system has brute force protection should I care for a very strong password

If a platform has brute force protection should I worry about creating a very strong password since any attacker would not get a chance to reach enough attempts to crack even the weakest password?
Not that I want to use a super weak passwo… Continue reading If a platform/system has brute force protection should I care for a very strong password

Shamir secret sharing, is security reduced by chunking a secret into smaller blocks?

When using Shamir’s secret sharing algorithm one has to define the size for the finite field over which the secret is split. I came across a few implementations, like secrets.js-lit, and as far as I can see the implementation chunks the se… Continue reading Shamir secret sharing, is security reduced by chunking a secret into smaller blocks?